1.
Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?
2.
A company is installing a new security measure that would allow one person at a time to be authenticated to an area without human interaction. Which of the
following does this describe?
3.

Which of the following provides authentication, authorization, and accounting services?
4.
Which of the following should be considered when implementing WPA vs. WPA2?
5.
A popular software application is used on all company workstation desktop and laptop computers. Which of the following is the BEST patch management process?
6.
Data classification and labeling is an example of:
7.
Jane, a security administrator, must be able to identify and validate every use of local administrative accounts across a large number of Windows and Linux
servers. Which of the following offers the BEST solution?
8.
Which of the following is MOST likely used to establish a secure connection between email gateways?
9.
Which of the following describes how Pete, an employee, gains access to a location by entering with a fellow co-worker and not using his own credentials?
10.
Sara, a security administrator, examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series
of the hex character 90 (x90).
Which of the following attack types has occurred?